The Post 9/11 Evolution of an Australian National Security Community

The Post 9/11 Evolution of an Australian National Security Community

Intelligence and National Security ISSN: 0268-4527 (Print) 1743-9019 (Online) Journal homepage: http://www.tandfonline.com/loi/fint20 Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community David Martin Jones To cite this article: David Martin Jones (2018) Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community, Intelligence and National Security, 33:1, 1-20, DOI: 10.1080/02684527.2016.1259796 To link to this article: http://dx.doi.org/10.1080/02684527.2016.1259796 Published online: 17 Nov 2016. Submit your article to this journal Article views: 440 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=fint20 Download by: [David Jones] Date: 14 November 2017, At: 20:22 INTELLIGENCE AND NATIONAL SECURITY, 2018 VOL. 33, NO. 1, 120 https://doi.org/10.1080/02684527.2016.1259796 ARTICLE Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community David Martin Jones ABSTRACT Since 2001 expenditure on the security services has increased exponentially in Western democracies and particularly amongst the Five Eyes community of the UK, the US, Canada, Australia and New Zealand. This has occurred in conjunction with the expansion of counter-terror laws. Yet somewhat problematically the phenomenon of Islamist inspired violence became more threatening to the internal security of western democracies in the frst decade of the twenty-frst century. This study examines the Western managerial approach to security using Australia as a case study. It argues that the growth of Australian security agencies since 2001 and their evolution into a National Security Community after 2008 has neglected basic maxims of political and constitutional prudence and eschews the modern state’s own contractual self -understanding of sovereignty and political obligation. Introduction Since 2001 expenditure on the security services has increased exponentially in Western democracies and particularly amongst the Five Eyes community, namely, the UK, the US, Canada, Australia and New Zealand.1 This has occurred in conjunction with the rapid expansion of counter-terror legisla- tion.2 Australia, in particular provides a notable example of this phenomenon. The federal government budget for the Australian Security Intelligence Organization (ASIO) rose by 250% between 2005 and 2015 and its staf numbers increased threefold from 600 ofcers in 2001 to 1800 by 2015.3 Other ser- vices within the Australian Intelligence Community (AIC) saw similar increases in both personnel and budgets. Meanwhile over the period, 2001–2011, the federal government enacted ‘ffty-four pieces of anti-terror legislation’.4 Downloaded by [David Jones] at 20:22 14 November 2017 Yet, somewhat paradoxically, the phenomenon of Islamist inspired violence and how it recruits amongst diasporic communities in Europe, North America and Australia has, over the same period, intensifed, rather than diminished, its challenge to the internal security of western democracies after the removal of Osama bin Laden and most of the core leadership of al-Qaeda between 2001 and 2011. Indeed, the declaration of a Sunni Caliphate of the Islamic State of Iraq and Syria (ISIS-also known as Islamic State of Iraq and the Levant ISIL or Daesh)5 in Mosul by its new Caliph, Abu Bakr al Baghdadi, in June 2014 dramatically increased the online appeal of and recruitment to ISIS, as well as the specifc internal domestic threat to Australian security. In Australia, the decisions by successive governments, of difering political complexions, to elaborate laws that libertarians considered curtailed free speech, coincided with new surveillance legislation to police the internet, and restrict the growing use of social media as a jihadist recruiting tool.6 It was widely advertised that the decision not to proceed against con- troversial speech act laws in Australia in 2015 refected the felt need to maintain community harmony, CONTACT David Martin Jones [email protected] © 2016 Informa UK Limited, trading as Taylor & Francis Group 2 D. M. JONES a strikingly similar view to that advocated by soft authoritarian, single party dominant regimes, like Singapore, in order to maintain religious peace in multicultural societies.7 This notwithstanding, Muslim communities in Australia consider themselves targeted by the extension of new laws that afect social media privacy. This development raises an interesting, but somewhat neglected, question concerning the efec- tiveness of a bureaucratic and managerial response to maintaining internal security in advanced liberal democratic polities. We shall examine this question and its political implications using Australia as a case study. Managerialism here is understood as a form of what the English political philosopher, Michael Oakeshott termed ‘rationalism in politics’. As a form of governance, it prefers disinterested policies untainted by political animus. It leads to a distinctively bureaucratic process of policy-making that considers government a matter of technique. As Oakeshott explained, it breaks human behaviour (in this case what the government and its security agencies consider ‘radicalization’ or ‘extremism’) into ‘a series of problems to be solved, purposes to be achieved, and a series of individual actions pursued in pursuit of these ends’. In other words, it ‘reduces the tangle and variety of experience to a set of principles’ which the technocrat or managerial class ‘will then attack and defend only upon rational grounds’.8 Rationalism combines the politics of the rational solution with the politics of uniformity.9 All problems from this perspective are ‘administrative’ problems reducible to management and training via ‘the sovereignty of technique’.10 The further question that this essay examines, therefore, is why the growth of security agencies and their budgets together with the proliferation of legislation to manage national security since 2001 has not facilitated greater internal political peace. Instead and the legislative response enhanced centralized bureaucratic administration, that mandates targets and sends messages at the expense of ‘constitu- tional principles’ and political prudence.11 Consequently, a managerial approach to terror post 9/11 eschews the modern and early modern state’s own secular and contractual understanding of political sovereignty, political obligation and the rule and capacity of common law as it evolved historically and contingently across the Anglosphere. In an updated version of what Carl Freidrich identifed as constitutional reason of state this prudential constitutional approach to politics would allow for a more robust interrogation of Islamically motivated fanaticism and its appeal without requiring the recourse to the ad hoc techniques of an emerging security state.12 This study, therefore, examines how an Australian national security dilemma concerning the balance between political freedom and government surveillance has evolved since 1942. It traces the manner in which the state’s legislative response to the problem posed by internal and external security threats after 9/11 expanded the AIC and folded it into a National Security Community (NSC)13 after 2008. These developments enhanced the centralisation and micromanagement of internal security.14 Enhanced Downloaded by [David Jones] at 20:22 14 November 2017 security has important social and political implications both for constitutional accountability and con- fdentiality. This study further argues that security legislation is too often reactive and responds to an Australian governmental tradition of managerial rationalism.15 Finally, it considers what alternative political understandings might provide legislative guidance without either undermining a prudential concern with national security or eroding Australia’s continuing commitment to constitutional dem- ocratic practice. Intelligence and national security: Australian dilemmas Australia, like Canada and New Zealand, inherited a British constitutional legacy and adapted it over time to its own contingent experience of internal and external threats to security. The Australian federal government response to 9/11 witnessed the expansion of counter-terror legislation and counter-terror establishments to address al-Qaeda and the subsequent evolution of what a Rand Corporation report termed the ‘Global Jihadist Movement’16 and, after 2014, the home grown appeal of ISIS. This legal response, beginning with The Security Legislation Amendment (Terrorism) Act 2002 and including amendments to the Australian Security Intelligence Organisation Act 2003, The Australian INTELLIGENCE AND NATIONAL SECURITY 3 Aviation Transport Security Amendment Act 2006, the Anti Money Laundering and Counter Terrorism Financing Act 2006 and culminating with The Review of Australia’s Counter Terrorism Machinery 2015, sought to deter acts of terrorism, as well as address problems associated with the use of common law to interdict potential terror acts.17 This evolution of the national security state exacerbated an unresolved political dispute over the character and extent of surveillance, the accountability of domestic security services and the threat they pose to civil liberties in a constitutional democracy.18 Attending to the Australian case sheds an interesting light

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us